-
1
-
-
84947612643
-
Proximity breeds danger: Emerging threats in metro-area wireless networks
-
Boston, MA, USA, August, USENIX Association
-
Akritidis, P., Chin, W.Y., Lam, V.T., Sidiroglou, S., Anagnostakis, K.G.: Proximity breeds danger: Emerging threats in metro-area wireless networks. In: Proceedings of 16th USENIX Security Symposium, Boston, MA, USA, August 2007. USENIX Association (2007)
-
(2007)
Proceedings of 16th USENIX Security Symposium
-
-
Akritidis, P.1
Chin, W.Y.2
Lam, V.T.3
Sidiroglou, S.4
Anagnostakis, K.G.5
-
2
-
-
0016518897
-
Efficient string matching: An aid to bibliographic search
-
Aho, A.V., Corasick, M.J.: Efficient string matching: an aid to bibliographic search. Communications of the ACM 18(6), 333-340 (1975)
-
(1975)
Communications of the ACM
, vol.18
, Issue.6
, pp. 333-340
-
-
Aho, A.V.1
Corasick, M.J.2
-
3
-
-
24944578141
-
Enterprise privacy authorization language (EPAL 1.2)
-
3485, IBM March
-
Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise privacy authorization language (EPAL 1.2). Research Report RZ 3485, IBM (March 2003)
-
(2003)
Research Report RZ
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Powers, C.4
Schunter, M.5
-
4
-
-
84885208335
-
Scanning electronic documents for personally identifiable information
-
Alexandria, VA, USA, October, ACM Press, New York () 2006
-
Aura, T., Kuhn, T.A., Roe, M.: Scanning electronic documents for personally identifiable information. In: Proceedings of 5th ACM Workshop on Privacy in the Electronic Society (WPES 2006), Alexandria, VA, USA, October 2006. ACM Press, New York (2006)
-
(2006)
Proceedings of 5th ACM Workshop on Privacy in the Electronic Society (WPES
-
-
Aura, T.1
Kuhn, T.A.2
Roe, M.3
-
5
-
-
50249147910
-
Securing network location awareness with authenticated DHCP
-
Nice, France, September, IEEE Press, Los Alamitos () 2007
-
Aura, T., Roe, M., Murdoch, S.J.: Securing network location awareness with authenticated DHCP. In: Proceedings of 3rd International Conference on Security and Privacy in Communication Networks (SecureComm 2007), Nice, France, September 2007. IEEE Press, Los Alamitos (2007)
-
(2007)
Proceedings of 3rd International Conference on Security and Privacy in Communication Networks (SecureComm
-
-
Aura, T.1
Roe, M.2
Murdoch, S.J.3
-
7
-
-
33746150499
-
The Windows of private DNS updates
-
Broido, A., Shang, H., Fomenkov, M., Hyun, Y., Claffy, K.: The Windows of private DNS updates. Computer Communication Review (ACM SIGCOMM) 36(3), 93-98 (2006)
-
(2006)
Computer Communication Review (ACM SIGCOMM)
, vol.36
, Issue.3
, pp. 93-98
-
-
Broido, A.1
Shang, H.2
Fomenkov, M.3
Hyun, Y.4
Claffy, K.5
-
8
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84-88 (1981)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.L.1
-
9
-
-
50249087017
-
-
Cheshire, S., Krochmal, M.: Multicast DNS. Internet-Draft draft-cheshire-dnsext-multicastdns-06, IETF, Expired (August 2006)
-
Cheshire, S., Krochmal, M.: Multicast DNS. Internet-Draft draft-cheshire-dnsext-multicastdns-06, IETF, Expired (August 2006)
-
-
-
-
10
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
San Diego, CA, USA, August, USENIX
-
Chow, J., Pfaff, B., Garfinkel, T., Christopher, K., Rosenblum, M.: Understanding data lifetime via whole system simulation. In: Proceedings of 13th Usenix Security Symposium, San Diego, CA, USA, August 2004, pp. 321-336. USENIX (2004)
-
(2004)
Proceedings of 13th Usenix Security Symposium
, pp. 321-336
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
11
-
-
33744479345
-
Freenet: A distributed anonymous information storage and retrieval system
-
Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
-
Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 46-66. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2009
, pp. 46-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.W.4
-
12
-
-
50249139703
-
-
Cranor, L.F.: Web Privacy with P3P. O'Reilly, Sebastopol (2002)
-
Cranor, L.F.: Web Privacy with P3P. O'Reilly, Sebastopol (2002)
-
-
-
-
13
-
-
50249189414
-
-
Cuellar, J.R., Morris Jr., J.B., Mulligan, D.K., Peterson, J., Polk, J.M.: Geopriv requirements. RFC 3693, IETF (February 2004)
-
Cuellar, J.R., Morris Jr., J.B., Mulligan, D.K., Peterson, J., Polk, J.M.: Geopriv requirements. RFC 3693, IETF (February 2004)
-
-
-
-
14
-
-
84957800033
-
-
Díaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482. Springer, Heidelberg (2003)
-
Díaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482. Springer, Heidelberg (2003)
-
-
-
-
15
-
-
85084161366
-
Tor: The second-generation onion router
-
San Diego, CA, USA. USENIX Association, August
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium, San Diego, CA, USA. USENIX Association ( August 2004)
-
(2004)
Proceedings of the 13th USENIX Security Symposium
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
16
-
-
85018108881
-
Passive data link layer 802.11 wireless device driver fingerprinting
-
Vancouver, B.C, ed, Canada, July, USENIX Association
-
Franklin, J., McCoy, D., Tabriz, P., Neagoe, V., Randwyk, J.V., Sicker, D.: Passive data link layer 802.11 wireless device driver fingerprinting. In: Vancouver, B.C. (ed.) 15th Proceedings of USENIX Security Symposium, Canada, July 2006, pp. 167-178. USENIX Association (2006)
-
(2006)
15th Proceedings of USENIX Security Symposium
, pp. 167-178
-
-
Franklin, J.1
McCoy, D.2
Tabriz, P.3
Neagoe, V.4
Randwyk, J.V.5
Sicker, D.6
-
17
-
-
85180626613
-
Device identification via analog signal fingerprinting: A matched filter approach
-
San Diego, CA, USA, February, Internet Society () 2006
-
Gerdes, R., Daniels, T., Mina, M., Russell, S.: Device identification via analog signal fingerprinting: A matched filter approach. In: Proceedings of 13th Annual Network and Distributed System Security Symposium (NDSS 2006), San Diego, CA, USA, February 2006. Internet Society (2006)
-
(2006)
Proceedings of 13th Annual Network and Distributed System Security Symposium (NDSS
-
-
Gerdes, R.1
Daniels, T.2
Mina, M.3
Russell, S.4
-
18
-
-
0020299523
-
Security policies and security models
-
Los Alamitos, CA, USA, April, IEEE Computer Society Press, Los Alamitos
-
Goguen, J.A., Meseguer, J.: Security policies and security models. In: Proceedings of IEEE Symposium on Research in Security and Privacy, Los Alamitos, CA, USA, April 1982, pp. 11-20. IEEE Computer Society Press, Los Alamitos (1982)
-
(1982)
Proceedings of IEEE Symposium on Research in Security and Privacy
, pp. 11-20
-
-
Goguen, J.A.1
Meseguer, J.2
-
19
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
San Francisco, CA, USA, May, USENIX Association
-
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of MobiSys 2003: The First International Conference on Mobile Systems, Applications, and Services, San Francisco, CA, USA, May 2003, pp. 31-42. USENIX Association (2003)
-
(2003)
Proceedings of MobiSys 2003: The First International Conference on Mobile Systems, Applications, and Services
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
21
-
-
38149070135
-
-
Guha, S., Francis, P.: Identity trail: Covert surveillance using DNS. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, 4776. Springer, Heidelberg (2007)
-
Guha, S., Francis, P.: Identity trail: Covert surveillance using DNS. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776. Springer, Heidelberg (2007)
-
-
-
-
22
-
-
85092666359
-
Can Ferris Bueller still have his day off? Protecting privacy in the wireless era
-
San Diego, CA, USA, May, USENIX Association
-
Greenstein, B., Gummadi, R., Pang, J., Chen, M.Y., Kohno, T., Seshan, S., Wetherall, D.: Can Ferris Bueller still have his day off? Protecting privacy in the wireless era. In: Proceedings of 11th Workshop on Hot Topics in Operating Systems (HotOS XI), San Diego, CA, USA, May 2007. USENIX Association (2007)
-
(2007)
Proceedings of 11th Workshop on Hot Topics in Operating Systems (HotOS
, vol.11
-
-
Greenstein, B.1
Gummadi, R.2
Pang, J.3
Chen, M.Y.4
Kohno, T.5
Seshan, S.6
Wetherall, D.7
-
23
-
-
35449007284
-
Preserving location privacy in wireless LANs
-
San Juan, Puerto Rico, USA, June, ACM Press, New York () 2007
-
Jiang, T., Wang, H.J., Hu, Y.-C.: Preserving location privacy in wireless LANs. In: Proceedings of 5th International Conference on Mobile Systems, Applications, and Services (MobiSys 2007), San Juan, Puerto Rico, USA, June 2007, pp. 246-257. ACM Press, New York (2007)
-
(2007)
Proceedings of 5th International Conference on Mobile Systems, Applications, and Services (MobiSys
, pp. 246-257
-
-
Jiang, T.1
Wang, H.J.2
Hu, Y.-C.3
-
25
-
-
27544460278
-
Remote physical device fingerprinting
-
Oakland, CA, USA, May, IEEE Computer Society Press, Los Alamitos
-
Kohno, T., Broido, A., Claffy, K.: Remote physical device fingerprinting. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2005. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Kohno, T.1
Broido, A.2
Claffy, K.3
-
26
-
-
33748990899
-
Peripheral privacy notifications for wireless networks
-
Alexandria, VA, USA, November, ACM Press, New York () 2005
-
Kowitz, B., Cranor, L.: Peripheral privacy notifications for wireless networks. In: Proceedings of Workshop on Privacy in Electronic Society (WPES 2005), Alexandria, VA, USA, November 2005, pp. 90-96. ACM Press, New York (2005)
-
(2005)
Proceedings of Workshop on Privacy in Electronic Society (WPES
, pp. 90-96
-
-
Kowitz, B.1
Cranor, L.2
-
27
-
-
50249160150
-
Instant messaging puts on a business suit
-
Lawton, G.: Instant messaging puts on a business suit. Computer 36(3), 14-16 (2003)
-
(2003)
Computer
, vol.36
, Issue.3
, pp. 14-16
-
-
Lawton, G.1
-
28
-
-
84885194335
-
Privacy management for secure mobility
-
Alexandria, VA, USA, October, ACM Press, New York () 2006
-
Lindqvist, J., Takkinen, L.: Privacy management for secure mobility. In: Proceedings of Workshop on Privacy in Electronic Society (WPES 2006), Alexandria, VA, USA, October 2006, pp. 63-66. ACM Press, New York (2006)
-
(2006)
Proceedings of Workshop on Privacy in Electronic Society (WPES
, pp. 63-66
-
-
Lindqvist, J.1
Takkinen, L.2
-
29
-
-
50249090565
-
-
Möller, U, Cottrell, L, Palfrader, P, Sassaman, L, Mixmaster Protocol -Version 2. Internet-Draft draft-moeller-v2-01, IETF, Expired July 2003
-
Möller, U., Cottrell, L., Palfrader, P., Sassaman, L.: Mixmaster Protocol -Version 2. Internet-Draft draft-moeller-v2-01, IETF, Expired (July 2003)
-
-
-
-
30
-
-
34547339276
-
Hot or not: Revealing hidden services by their clock skew
-
Alexandria, VA, USA, November, ACM Press, New York () 2006
-
Murdoch, S.J.: Hot or not: Revealing hidden services by their clock skew. In: Proceedings of ACM Conference on Computer and Communications Security (CCS 2006), Alexandria, VA, USA, November 2006, pp. 27-36. ACM Press, New York (2006)
-
(2006)
Proceedings of ACM Conference on Computer and Communications Security (CCS
, pp. 27-36
-
-
Murdoch, S.J.1
-
32
-
-
84866369989
-
Tryst: The case for confidential service discovery
-
HotNets-VI, Atlanta, CA, USA, November, ACM Press, New York
-
Pang, J., Greenstein, B., McCoy, D., Seshan, S., Wetherall, D.: Tryst: The case for confidential service discovery. In: Proceedings of the 6th Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, CA, USA, November 2007. ACM Press, New York (2007)
-
(2007)
Proceedings of the 6th Workshop on Hot Topics in Networks
-
-
Pang, J.1
Greenstein, B.2
McCoy, D.3
Seshan, S.4
Wetherall, D.5
-
33
-
-
37749006403
-
802.11 user fingerprinting
-
Montreal, QC, Canada, September, ACM Press, New York () 2007
-
Pang, J., Greenstein, B., Gummadi, R., Seshan, S., Wetherall, D.: 802.11 user fingerprinting. In: Proceedings of 13th Annual International Conference on Mobile Computing and Networking (MobiCom 2007), Montreal, QC, Canada, September 2007. ACM Press, New York (2007)
-
(2007)
Proceedings of 13th Annual International Conference on Mobile Computing and Networking (MobiCom
-
-
Pang, J.1
Greenstein, B.2
Gummadi, R.3
Seshan, S.4
Wetherall, D.5
-
35
-
-
50249176037
-
-
Piper, D., Swander, B.:AGSS-APIauthentication method for IKE. Internet-Draft draft-ietf-ipsec-isakmp-gss-auth-07, IETF, Expired (July 2001)
-
Piper, D., Swander, B.:AGSS-APIauthentication method for IKE. Internet-Draft draft-ietf-ipsec-isakmp-gss-auth-07, IETF, Expired (July 2001)
-
-
-
-
38
-
-
78650117270
-
Devices that tell on you: Privacy trends in consumer ubiquitous computing
-
Boston, MA, USA, August, USENIX Association
-
Saponas, T.S., Lester, J., Hartung, C., Agarwal, S., Kohno, T.: Devices that tell on you: Privacy trends in consumer ubiquitous computing. In: Proceedings of 16th USENIX Security Symposium, Boston, MA, USA, August 2007. USENIX Association (2007)
-
(2007)
Proceedings of 16th USENIX Security Symposium
-
-
Saponas, T.S.1
Lester, J.2
Hartung, C.3
Agarwal, S.4
Kohno, T.5
-
39
-
-
84957802536
-
-
Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482. Springer, Heidelberg (2003)
-
Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482. Springer, Heidelberg (2003)
-
-
-
-
40
-
-
0003899069
-
-
RFC 5216, IETF March
-
Simon, D., Aboba, B., Hurst, R.: The EAP-TLS authentication protocol. RFC 5216, IETF (March 2008)
-
(2008)
The EAP-TLS authentication protocol
-
-
Simon, D.1
Aboba, B.2
Hurst, R.3
-
41
-
-
0030676973
-
Anonymous connections and onion routing
-
Oakland, CA, USA, May, IEEE Computer Society Press, Los Alamitos
-
Syverson, P.F., Goldschlag, D.M., Reed, M.G.: Anonymous connections and onion routing. In: Proc. 1997 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 1997, pp. 44-54. IEEE Computer Society Press, Los Alamitos (1997)
-
(1997)
Proc. 1997 IEEE Symposium on Security and Privacy
, pp. 44-54
-
-
Syverson, P.F.1
Goldschlag, D.M.2
Reed, M.G.3
-
42
-
-
0036811662
-
k-Anonymity: A model for protecting privacy. International Journal on Uncertainty
-
Sweeney, L.: k-Anonymity: a model for protecting privacy. International Journal on Uncertainty. Fuzziness and Knowledge-based Systems 10(5), 557-570 (2002)
-
(2002)
Fuzziness and Knowledge-based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
44
-
-
84991934426
-
TightLip: Keeping applications from spilling the beans
-
Cambridge, MA, USA, April, USENIX Association
-
Yumerefendi, A.R., Mickle, B., Cox, L.P.: TightLip: Keeping applications from spilling the beans. In: Proceedings of 4th USENIX Symposium on Networked Systems Design & Implementation, Cambridge, MA, USA, April 2007, pp. 159-172. USENIX Association (2007)
-
(2007)
Proceedings of 4th USENIX Symposium on Networked Systems Design & Implementation
, pp. 159-172
-
-
Yumerefendi, A.R.1
Mickle, B.2
Cox, L.P.3
-
45
-
-
50249179253
-
DOG: Efficient information flow tracing and program monitoring with dynamic binary rewriting
-
Technical report, MIT
-
Zhao, Q., Cheng, W.W., Yu, B., Hiroshige, S.: DOG: Efficient information flow tracing and program monitoring with dynamic binary rewriting. Technical report, MIT (2005)
-
(2005)
-
-
Zhao, Q.1
Cheng, W.W.2
Yu, B.3
Hiroshige, S.4
|